{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,7]],"date-time":"2026-01-07T08:07:52Z","timestamp":1767773272133,"version":"3.37.3"},"reference-count":21,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"Cyber Security Research Centre Limited (CSCRC) whose activities are partially"},{"DOI":"10.13039\/100015539","name":"Australian Government\u2019s Cooperative Research Centres Programme","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100015539","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/access.2023.3293526","type":"journal-article","created":{"date-parts":[[2023,7,10]],"date-time":"2023-07-10T19:29:04Z","timestamp":1689017344000},"page":"70011-70022","source":"Crossref","is-referenced-by-count":10,"title":["Darknet Traffic Analysis: Investigating the Impact of Modified Tor Traffic on Onion Service Traffic Classification"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5349-4943","authenticated-orcid":false,"given":"Ishan","family":"Karunanayake","sequence":"first","affiliation":[{"name":"Institute for Cybersecurity (IFCYBER), University of New South Wales (UNSW), Sydney, NSW, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8169-040X","authenticated-orcid":false,"given":"Nadeem","family":"Ahmed","sequence":"additional","affiliation":[{"name":"Institute for Cybersecurity (IFCYBER), University of New South Wales (UNSW), Sydney, NSW, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9672-5601","authenticated-orcid":false,"given":"Robert","family":"Malaney","sequence":"additional","affiliation":[{"name":"Institute for Cybersecurity (IFCYBER), University of New South Wales (UNSW), Sydney, NSW, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8317-5727","authenticated-orcid":false,"given":"Rafiqul","family":"Islam","sequence":"additional","affiliation":[{"name":"School of Computing and Mathematics, Charles Sturt University, Albury, NSW, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1844-1520","authenticated-orcid":false,"given":"Sanjay K.","family":"Jha","sequence":"additional","affiliation":[{"name":"Institute for Cybersecurity (IFCYBER), University of New South Wales (UNSW), Sydney, NSW, Australia"}]}],"member":"263","reference":[{"key":"ref13","first-page":"1187","article-title":"k-fingerprinting: A robust scalable website fingerprinting technique","author":"hayes","year":"2016","journal-title":"Proc 25th USENIX Conf Secur Symp (SEC)"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3423351"},{"key":"ref15","first-page":"115","article-title":"Web MIXes: A system for anonymous and unobservable Internet access","volume":"2009","author":"berthold","year":"2000","journal-title":"Proc Int Workshop Design Issues Anonymity Unobservability"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ISDA.2008.209"},{"key":"ref20","first-page":"507","article-title":"Laplacian score for feature selection","author":"he","year":"2005","journal-title":"Proc Adv Neural Inf Process Syst (NIPS)"},{"key":"ref11","first-page":"1375","article-title":"Walkie-talkie: An efficient defense against passive website fingerprinting attacks","author":"wang","year":"2017","journal-title":"Proc 26th USENIX Secur Symp (SEC)"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45744-4_2"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-020-02141-0"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382208"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.21236\/ADA465464"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243768"},{"key":"ref16","first-page":"401","article-title":"I2P data communication system","author":"zantout","year":"2011","journal-title":"Proc 10th Int Conf Netw (ICN)"},{"journal-title":"Data Mining Practical Machine Learning Tools and Techniques","year":"2011","author":"witten","key":"ref19"},{"key":"ref18","first-page":"2021","article-title":"How unique is your.onion?: An analysis of the fingerprintability of Tor onion services","author":"overdorf","year":"2017","journal-title":"Proc ACM SIGSAC Conf Comput Commun Secur (CCS)"},{"journal-title":"Keeping a Hidden Identity Mirai C&Cs in Tor Network","year":"2019","key":"ref8"},{"journal-title":"Ransomware Analysis","year":"2017","key":"ref7"},{"journal-title":"Europol Global action against dark markets on Tor network","year":"2014","key":"ref9"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICKII.2018.8569113"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.5220\/0006105602530262"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2804394"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CBD.2014.37"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/10005208\/10177161.pdf?arnumber=10177161","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,7]],"date-time":"2023-08-07T18:35:58Z","timestamp":1691433358000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10177161\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/access.2023.3293526","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2023]]}}}